DC ElementWertSprache
dc.contributor.authorHäckel, Timo-
dc.contributor.authorSchmidt, Anja-
dc.contributor.authorMeyer, Philipp-
dc.contributor.authorKorf, Franz-
dc.contributor.authorSchmidt, Thomas-
dc.date.accessioned2021-03-31T15:48:09Z-
dc.date.available2021-03-31T15:48:09Z-
dc.date.issued2020-12-16-
dc.identifier.isbn9781728192215en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12738/10768-
dc.description.abstractCurrent In-Vehicle Networks (IVNs) connect Electronic Control Units (ECUs) via domain buses. A gateway forwards messages between these domains. Automotive Ethernet emerges as a flat, high-speed backbone technology for IVNs that carries the various control flows within Ethernet frames. Recently, Software-Defined Networking (SDN) has been identified as a useful building block of the vehicular domain, as it allows the differentiation of packets based on all header fields and thus can isolate unrelated control flows. In this work, we systematically explore the different strategies for integrating automotive control flows in switched Ether-networks and analyze their security impact for a software-defined IVN. We discuss how control flow identifiers can be embedded on different layers resulting in a range of solutions from fully exposed embedding to deep encapsulation. We evaluate these strategies in a realistic IVN based on the communication matrix of a production grade vehicle, which we map into a modern Ethernet topology. We find that visibility of automotive control flows within packet headers is essential for the network infrastructure to enable isolation and access control. With an exposed embedding, the SDN backbone can establish and survey trust zones within the IVN and largely reduce the attack surface of connected cars. An exposed embedding strategy also minimizes communication expenses.en_US
dc.language.isoen_USen_US
dc.subjectAutomotive Etherneten_US
dc.subjectflow separationen_US
dc.subjectIVNen_US
dc.subjectnetwork experimentationen_US
dc.subjectSDNen_US
dc.subjectSOME/IPen_US
dc.subject.ddc004: Informatiken_US
dc.titleStrategies for Integrating Control Flows in Software-Defined In-Vehicle Networks and Their Impact on Network Securityen_US
dc.typeinProceedingsen_US
dc.relation.conference2020 IEEE Vehicular Networking Conference (VNC)en_US
tuhh.container.endpage8en_US
tuhh.container.startpage1en_US
tuhh.container.volume2020-Decemberen_US
tuhh.oai.showtrueen_US
tuhh.publication.instituteFakultät Technik und Informatiken_US
tuhh.publication.instituteDepartment Informatiken_US
tuhh.publisher.doi10.1109/VNC51378.2020.9318372-
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.type.casraiConference Paper-
dc.type.dinicontributionToPeriodical-
dc.type.drivercontributionToPeriodical-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
tuhh.container.articlenumber9318372-
item.creatorGNDHäckel, Timo-
item.creatorGNDSchmidt, Anja-
item.creatorGNDMeyer, Philipp-
item.creatorGNDKorf, Franz-
item.creatorGNDSchmidt, Thomas-
item.fulltextNo Fulltext-
item.creatorOrcidHäckel, Timo-
item.creatorOrcidSchmidt, Anja-
item.creatorOrcidMeyer, Philipp-
item.creatorOrcidKorf, Franz-
item.creatorOrcidSchmidt, Thomas-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.languageiso639-1en_US-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
item.openairetypeinProceedings-
crisitem.author.deptDepartment Informatik-
crisitem.author.deptDepartment Informatik-
crisitem.author.deptDepartment Informatik-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-8343-0625-
crisitem.author.orcid0000-0002-6628-7652-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
crisitem.author.parentorgFakultät Technik und Informatik-
crisitem.author.parentorgFakultät Technik und Informatik-
crisitem.author.parentorgFakultät Technik und Informatik-
Enthalten in den Sammlungen:Publications without full text
Zur Kurzanzeige

Seitenansichten

127
checked on 26.12.2024

Google ScholarTM

Prüfe

HAW Katalog

Prüfe

Volltext ergänzen

Feedback zu diesem Datensatz


Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.